IA-5 Authenticator Management
Description
Individual authenticators include, for example, passwords, tokens, biometrics, PKI certificates, and key cards. Initial authenticator content is the actual content (e.g., the initial password) as opposed to requirements about authenticator content (e.g., minimum password length).
In many cases, developers ship information system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well known, easily discoverable, and present a significant security risk.
The requirement to protect individual authenticators may be implemented via control PL-4 or PS-6 for authenticators in the possession of individuals and by controls AC-3 and AC-6 for authenticators stored within organizational information systems (e.g., passwords stored in hashed or encrypted formats, files containing encrypted or hashed passwords accessible with administrator privileges).
Information systems support individual authenticator management by organization-defined settings and restrictions for various authenticator characteristics including, for example:
- minimum password length,
- password composition,
- validation time window for time synchronous one-time tokens, and
- number of allowed rejections during the verification stage of biometric authentication.
Specific actions that can be taken to safeguard authenticators include, for example, maintaining possession of individual authenticators, not loaning or sharing individual authenticators with others, and reporting lost, stolen, or compromised authenticators immediately.
Authenticator management includes issuing and revoking, when no longer needed, authenticators for temporary access such as that required for remote maintenance. Device authenticators include, for example, certificates and passwords.
Applicability
This Control also applies to any other entity that uses university information resources that require authentication.
The intended audiences are university employees who are required to ensure that password-based authentication procedures are followed (e.g., unit heads, information resource owners and custodians); and those individuals who need to be aware of the procedures (e.g., non-technical university employees, staff, faculty, student, guest, or visitor).
Implementation
TAMU-CC manages information system authenticators by:
- Defining initial authenticator content. Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator;
- Establishing initial authenticator content for authenticators defined by the organization;
- Ensuring that authenticators have sufficient strength of mechanism for their intended use;
- Establishing and implementing administrative procedures for initial authenticator distribution, for lost/compromised or damaged authenticators, and for revoking authenticators;
- Changing default content of authenticators prior to information system installation;
- Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators;
- Changing/refreshing authenticators every one hundred eighty (180) days;
- Protecting authenticator content from unauthorized disclosure and modification;
- Requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators; and
- Changing authenticators for group/role accounts when membership to those accounts’ changes.
Requirements for password complexity based on type of user:
- Ensure that passwords comply with the following:
- Individual interactive account (student, faculty, staff, and affiliate)
- Generation: user-chosen or randomly generated by algorithm
- Expiration: 180
- Minimum Length: 8 characters
- Required Complexity. At least three of the following five:
- Uppercase characters of European languages (A through Z, with diacritic marks, Greek and Cyrillic characters)
- Lowercase characters of European languages (a through z, sharp-s, with diacritic marks, Greek and Cyrillic characters)
- Base 10 digits (0 through 9)
- Non-alphanumeric characters: ~!@#$%^&*_-+=`|\(){}[]:;"'<>,.?/
- Any Unicode character that is categorized as an alphabetic character but is not uppercase or lowercase. This includes Unicode characters from Asian languages.
- History: 10 passwords
- Min Age: 1 day
- Administrative Interactive account (.admin, _admin or admin for systems that require a local administrative account)
- Generation: user-chosen or randomly generated by algorithm
- Expiration: 180
- Minimum Length: 12 characters
- Required Complexity. At least three of the following five:
- Uppercase characters of European languages (A through Z, with diacritic marks, Greek and Cyrillic characters)
- Lowercase characters of European languages (a through z, sharp-s, with diacritic marks, Greek and Cyrillic characters)
- Base 10 digits (0 through 9)
- Non-alphanumeric characters: ~!@#$%^&*_-+=`|\(){}[]:;"'<>,.?/
- Any Unicode character that is categorized as an alphabetic character but is not uppercase or lowercase. This includes Unicode characters from Asian languages.
- History: 10 passwords
- Min Age: 1 day
- Service Accounts
- Generation: Randomly generated by algorithm
- Expiration: Never
- Minimum Length: 24 chars
- Required Complexity. At least three of the following five:
- Uppercase characters of European languages (A through Z, with diacritic marks, Greek and Cyrillic characters)
- Lowercase characters of European languages (a through z, sharp-s, with diacritic marks, Greek and Cyrillic characters)
- Base 10 digits (0 through 9)
- Non-alphanumeric characters: ~!@#$%^&*_-+=`|\(){}[]:;"'<>,.?/
- Any Unicode character that is categorized as an alphabetic character but is not uppercase or lowercase. This includes Unicode characters from Asian languages.
- History: 10
- Min Age: 1 day
- Individual interactive account (student, faculty, staff, and affiliate)
- Other precautions should be taken where feasible and relevant:
- Limit login to specific source IP address(es);
- Turn off interactive login.
Revision History
Last Updated: February 21, 2025
Previous Versions:
- June 29, 2023
- May 31, 2022
- March 25, 2021
- September 16, 2019